VID |
28172 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
A version of Sun Java JRE which is older than 1.5.0_10 or 1.4.2_13 or 1.3.1_19 has been installed on the host. The Sun Java JRE installed on the relevant host, according to its version number, has a heap-based buffer overflow vulnerability via a specially crafted GIF image with an image width of 0. The Java Plug-in is part of the Java 2 Runtime Environment (JRE) and establishes a framework for displaying Java applets within a web browser. Sun Microsystems Java Runtime Environment (JRE) and Software Development Kit (SDK) versions prior to 1.5.0_10 or 1.4.2_13 or 1.3.1_19 provide support for dynamic and static versioning when loading applets in the Java plug-in. What this means is that it is possible during the invocation of an applet to request that a particular version of a plug-in is used to run the applet. An attacker could exploit this feature to cause a previous version of a plug-in, that is known to be prone to security vulnerabilities, to be loaded.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102760-1 http://www.zerodayinitiative.com/advisories/ZDI-07-005.html http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0329.html http://www.kb.cert.org/vuls/id/388289 http://secunia.com/advisories/23757/
* Platforms Affected: Sun Microsystems, Sun JDK and JRE 5.0 Update 9 and earlier Sun Microsystems, Sun SDK and JRE 1.4.2_12 and earlier Sun Microsystems, Sun SDK and JRE 1.3.1_18 and earlier Sun Microsystems, Solaris 7, 8, 9 Microsoft Windows Any version Unix Any version Linux Any version |
Recommendation |
Upgrade to the latest version of Sun JRE/SDK (5.0 Update 10 or 1.4.2_13 or 1.3.1_19 or later), available from the following Sun Microsystems, Inc. Web sites: http://java.sun.com/javase/downloads/index_jdk5.jsp http://java.sun.com/j2se/1.4.2/download.html http://java.sun.com/j2se/1.3/download.html
-- AND --
When upgrading a Java installation on a computer, all previous versions should be uninstalled to prevent them being accessed to run a malicious applet that may exploit latent vulnerabilities that may exist in those other previous versions.
It is also possible to workaround this issue by disabling Java support in the Web browser or any other applications that provide an environment for execution Java applets. |
Related URL |
CVE-2007-0243 (CVE) |
Related URL |
22085 (SecurityFocus) |
Related URL |
31537 (ISS) |
|